G. Smaragdakis
37 records found
1
WALL-EYE: Taking a look at CubeSat security
Security analysis of CubeSats on a physical testbed
Tense-based backdoor attacks on large language models
Tense versus tensor
Iteratively Detecting Collaborative Scanner Fingerprints
An Iterative Approach to Identifying Fingerprints using Stratified Sampling
probes the entire internet to find which hosts have open ports. These scans are practically
impossible to detect b ...
An Investigation into Collaborative Scanners
Manually detecting and tracking collaborative scanners’ behaviour over a prolonged period
Detecting Collaborative ZMap Scans
Detection of distributed ZMap scans in network telescope data using an algorithmic approach
Estimating the Amplification Factor of Three Common Protocols in DRDoS Attacks
A Quantitative Analysis on the Weaponisation of Hosts Located in Greece
Investigating the Amplification Potential of Common UDP-Based Protocols in DDoS Attacks
A measurement study conducted across the networking infrastructure in Belgium and Luxembourg
Amplification Detection: Determining DDoS Abuse Potential of Your Network
A Quantitative Study of the Amplification Potential of Three Popular Protocols
Estimating the Amplification Factors in the Network Infrastructure of France
Defining factors that affect amplification DoS attacks
In today's network environment, many inf ...
Unveiling the Evolution
Analysing Generational Variances in Malware Families
Probing the Dark Web
Optimizing Port Scanning for Dark Web Protocol Analysis
Malware Evolution
Unraveling Malware Genomics: Synergistic Approach using Deep Learning and Phylogenetic Analysis for Evolutionary Insights
The rapid advancement of artificial intelligence technologies has significantly increased the complexity of polymorphic and metamorphic malware, presenting new challenges to cybersecurity defenses. Our study introduces a novel bioinformatics-inspired approach, leveraging dee ...